DocumentCode
2651491
Title
WANTED: a theft-deterrent solution for the pervasive computing world
Author
Droz, Patrick ; Gülcü, Ceki ; Haas, Robert
Author_Institution
IBM Zurich Res. Lab., Ruschlikon, Switzerland
fYear
2000
fDate
2000
Firstpage
374
Lastpage
379
Abstract
This paper presents a new theft-deterrent system called WANTED. The system relies on credits and blacklists, with each protected device periodically requesting new credit in order to continue operating. The main features of WANTED are resistance to attacks, guaranteed privacy, and scalability. The client part is a hybrid system consisting of an untrusted software component and a trusted hardware component. This offers maximum flexibility, while keeping the hardware requirements low
Keywords
authorisation; cryptography; mobile computing; tracking; WANTED; attack resistance; blacklists; credits; flexibility; guaranteed privacy; hybrid system; low hardware requirements; pervasive computing world; protected device; scalability; tamperproof cryptography hardware; theft-deterrent system; trusted hardware component; untrusted software component; Authentication; Cryptographic protocols; Cryptography; Hardware; Laboratories; Monitoring; Pervasive computing; Protection; Scalability; Transmitters;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Communications and Networks, 2000. Proceedings. Ninth International Conference on
Conference_Location
Las Vegas, NV
ISSN
1095-2055
Print_ISBN
0-7803-6494-5
Type
conf
DOI
10.1109/ICCCN.2000.885517
Filename
885517
Link To Document